diff options
Diffstat (limited to 'patchsets/pam_skey/1.1.5/02_all_require_skey.patch')
-rw-r--r-- | patchsets/pam_skey/1.1.5/02_all_require_skey.patch | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch index 9e51362..c43029a 100644 --- a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch +++ b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch @@ -49,7 +49,7 @@ the module doesn't change. return PAM_SUCCESS. 3a. If the token is invalid and use_first_pass is enabled, return - PAM_IGNORE. -+ PAM_IGNORE (or PAM_AUTHERR if require_skey is set). ++ PAM_IGNORE (or PAM_AUTH_ERR if require_skey is set). 4. If no_default_skey is enabled, issue a "Password: " prompt. 4a. If the response is anything besides "s/key" (case insensitive), store it as the authentication token and return PAM_IGNORE. @@ -63,13 +63,13 @@ the module doesn't change. 5a. If an empty response is given, request the S/Key response again, this time with input echoed. 5b. If the response is a valid S/Key response, return PAM_SUCCESS. - Otherwise, return PAM_AUTHERR. + Otherwise, return PAM_AUTH_ERR. 6. If the response is a valid S/Key response, return PAM_SUCCESS. -7. Otherwise, if no_default_skey is enabled (the user specifically -- requested "s/key" authentication), return PAM_AUTHERR. +- requested "s/key" authentication), return PAM_AUTH_ERR. +7. Otherwise, if no_default_skey is enabled (and the user specifically + requested "s/key" authentication), or if require_skey is enabled, -+ return PAM_AUTHERR. ++ return PAM_AUTH_ERR. 8. Otherwise, store the response as the authentication token and return PAM_IGNORE. |